2 Dear Reader: This product was prepared by the staff of the Federal Research Division of the Library of Congress under an Interagency Agreement with the sponsoring United States Government agency. The Federal Research Division is the Library of Congress's primary fee-for-service research unit and has served United States Government agencies since At the request of Executive and Judicial branch agencies, and on a cost-recovery basis, the Division prepares customized studies and reports, chronologies, bibliographies, foreign-language abstracts, databases, and other directed-research products in hardcopy and electronic media. The research includes a broad spectrum of social sciences, physical sciences, and humanities topics using the collections of the Library of Congress and other information sources world-wide. For additional information on obtaining the research and analytical services of the Federal Research Division, please call , fax ), via or write to: Marketing Coordinator, Federal Research Division, Library of Congress, Washington, DC The Division's World Wide Web Homepage can be viewed at Robert L. Worden, Ph.D. Chief Federal Research Division Library of Congress 101 Independence Ave SE Washington, DC

3 PREFACE The purpose of this study is to focus attention on the types of individuals and groups that are prone to terrorism (see Glossary) in an effort to help improve U.S. counterterrorist methods and policies. The emergence of amorphous and largely unknown terrorist individuals and groups operating independently (freelancers) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure of urgency to increasing our understanding of the psychological and sociological dynamics of terrorist groups and individuals. The approach used in this study is twofold. First, the study examines the relevant literature and assesses the current knowledge of the subject. Second, the study seeks to develop psychological and sociological profiles of foreign terrorist individuals and selected groups to use as case studies in assessing trends, motivations, likely behavior, and actions that might deter such behavior, as well as reveal vulnerabilities that would aid in combating terrorist groups and individuals. Because this survey is concerned not only with assessing the extensive literature on sociopsychological aspects of terrorism but also providing case studies of about a dozen terrorist groups, it is limited by time constraints and data availability in the amount of attention that it can give to the individual groups, let alone individual leaders or other members. Thus, analysis of the groups and leaders will necessarily be incomplete. A longer study, for example, would allow for the collection and study of the literature produced by each group in the form of autobiographies of former members, group communiqués and manifestos, news media interviews, and other resources. Much information about the terrorist mindset (see Glossary) and decision-making process can be gleaned from such sources. Moreover, there is a language barrier to an examination of the untranslated literature of most of the groups included as case studies herein. Terrorism databases that profile groups and leaders quickly become outdated, and this report is no exception to that rule. In order to remain current, a terrorism database ideally should be updated periodically. New groups or terrorist leaders may suddenly emerge, and if an established group perpetrates a major terrorist incident, new information on the group is likely to be reported in news media. Even if a group appears to be quiescent, new information may become available about the group from scholarly publications. i

4 There are many variations in the transliteration for both Arabic and Persian. The academic versions tend to be more complex than the popular forms used in the news media and by the Foreign Broadcast Information Service (FBIS). Thus, the latter usages are used in this study. For example, although Ussamah bin Ladin is the proper transliteration, the more commonly used Osama bin Laden is used in this study. ii

5 TABLE OF CONTENTS PREFACE... i EXECUTIVE SUMMARY: MINDSETS OF MASS DESTRUCTION... 1 New Types of Post-Cold War Terrorists... 1 New Forms of Terrorist-Threat Scenarios INTRODUCTION... 9 TERMS OF ANALYSIS Defining Terrorism and Terrorists Terrorist Group Typologies APPROACHES TO TERRORISM ANALYSIS The Multicausal Approach The Political Approach The Organizational Approach The Physiological Approach The Psychological Approach GENERAL HYPOTHESES OF TERRORISM Frustration-Aggression Hypothesis Negative Identity Hypothesis Narcissistic Rage Hypothesis THE PSYCHOLOGY OF THE TERRORIST Terrorist Motivation The Process of Joining a Terrorist Group The Terrorist as Mentally Ill The Terrorist as Suicidal Fanatic Fanatics Suicide Terrorists Terrorist Group Dynamics Pressures to Conform Pressures to Commit Acts of Violence Terrorist Rationalization of Violence The Terrorist s Ideological or Religious Perception TERRORIST PROFILING iii

9 EXECUTIVE SUMMARY: MINDSETS OF MASS DESTRUCTION New Types of Post-Cold War Terrorists In the 1970s and 1980s, it was commonly assumed that terrorist use of weapons of mass destruction (WMD) would be counterproductive because such an act would be widely condemned. Terrorists want a lot of people watching, not a lot of people dead, Brian Jenkins (1975:15) opined. Jenkins s premise was based on the assumption that terrorist behavior is normative, and that if they exceeded certain constraints and employed WMD they would completely alienate themselves from the public and possibly provoke swift and harsh retaliation. This assumption does seem to apply to certain secular terrorist groups. If a separatist organization such as the Provisional Irish Republic Army (PIRA) or the Basque Fatherland and Liberty (Euzkadi Ta Askatasuna ETA), for example, were to use WMD, these groups would likely isolate their constituency and undermine sources of funding and political support. When the assumptions about terrorist groups not using WMD were made in the 1970s and 1980s, most of the terrorist groups making headlines were groups with political or nationalist-separatist agenda. Those groups, with some exceptions, such as the Japanese Red Army (JRA Rengo Sekigun), had reason not to sabotage their ethnic bases of popular support or other domestic or foreign sympathizers of their cause by using WMD. Trends in terrorism over the past three decades, however, have contradicted the conventional thinking that terrorists are averse to using WMD. It has become increasingly evident that the assumption does not apply to religious terrorist groups or millenarian cults (see Glossary). Indeed, since at least the early 1970s analysts, including (somewhat contradictorily) Jenkins, have predicted that the first groups to employ a weapon of mass destruction would be religious sects with a millenarian, messianic, or apocalyptic mindset. When the conventional terrorist groups and individuals of the early 1970s are compared with terrorists of the early 1990s, a trend can be seen: the emergence of religious fundamentalist and new religious groups espousing the rhetoric of mass-destruction terrorism. In the 1990s, groups motivated by religious imperatives, such as Aum Shinrikyo, Hizballah, and al-qaida, have grown and proliferated. These groups have a different attitude toward violence one that is extranormative and seeks to maximize violence against the perceived enemy, 1

10 essentially anyone who is not a fundamentalist Muslim or an Aum Shinrikyo member. Their outlook is one that divides the world simplistically into them and us. With its sarin attack on the Tokyo subway system on March 20, 1995, the doomsday cult Aum Shinrikyo turned the prediction of terrorists using WMD into reality. Beginning in the early 1990s, Aum Shinrikyo engaged in a systematic program to develop and use WMD. It used chemical or biological WMD in about a dozen largely unreported instances in the first half of the 1990s, although they proved to be no more effective actually less effective than conventional weapons because of the terrorists ineptitude. Nevertheless, it was Aum Shinrikyo s sarin attack on the Tokyo subway on March 20, 1995, that showed the world how dangerous the mindset of a religious terrorist group could be. The attack provided convincing evidence that Aum Shinrikyo probably would not hesitate to use WMD in a U.S. city, if it had an opportunity to do so. These religiously motivated groups would have no reason to take credit for such an act of mass destruction, just as Aum Shinrikyo did not take credit for its attack on the Tokyo subway, and just as Osama bin Laden did not take credit for various acts of highcasualty terrorism against U.S. targets in the 1990s. Taking credit means asking for retaliation. Instead, it is enough for these groups to simply take private satisfaction in knowing that they have dealt a harsh blow to what they perceive to be the Great Satan. Groups unlikely to be deterred by fear of public disapproval, such as Aum Shinrikyo, are the ones who seek chaos as an end in itself. The contrast between key members of religious extremist groups such as Hizballah, al-qaida, and Aum Shinrikyo and conventional terrorists reveals some general trends relating to the personal attributes of terrorists likely to use WMD in coming years. According to psychologist Jerrold M. Post (1997), the most dangerous terrorist is likely to be the religious terrorist. Post has explained that, unlike the average political or social terrorist, who has a defined mission that is somewhat measurable in terms of media attention or government reaction, the religious terrorist can justify the most heinous acts in the name of Allah, for example. One could add, in the name of Aum Shinrikyo s Shoko Asahara. Psychologist B.J. Berkowitz (1972) describes six psychological types who would be most likely to threaten or try to use WMD: paranoids, paranoid schizophrenics, borderline mental defectives, schizophrenic types, passive-aggressive personality (see Glossary) types, and sociopath (see Glossary) personalities. He considers sociopaths the most likely actually to use WMD. Nuclear terrorism expert Jessica 2

11 Stern (1999: 77) disagrees. She believes that Schizophrenics and sociopaths, for example, may wan to commit acts of mass destruction, but they are less likely than others to succeed. She points out that large-scale dissemination of chemical, biological, or radiological agents requires a group effort, but that Schizophrenics, in particular, often have difficulty functioning in groups... Stern s understanding of the WMD terrorist appears to be much more relevant than Berkowitz s earlier stereotype of the insane terrorist. It is clear from the appended case study of Shoko Asahara that he is a paranoid. Whether he is schizophrenic or sociopathic is best left to psychologists to determine. The appended case study of Ahmed Ramzi Yousef, mastermind of the World Trade Center (WTC) bombing on February 26, 1993, reported here does not suggest that he is schizophrenic or sociopathic. On the contrary, he appears to be a welleducated, highly intelligent Islamic terrorist. In 1972 Berkowitz could not have been expected to foresee that religiously motivated terrorists would be prone to using WMD as a way of emulating God or for millenarian reasons. This examination of about a dozen groups that have engaged in significant acts of terrorism suggests that the groups most likely to use WMD are indeed religious groups, whether they be wealthy cults like Aum Shinrikyo or well-funded Islamic terrorist groups like al-qaida or Hizballah. The fall of the Berlin Wall in 1989 and the collapse of the Soviet Union in 1991 fundamentally changed the operating structures of European terrorist groups. Whereas groups like the Red Army Faction (Rote Armee Faktion RAF; see Glossary) were able to use East Germany as a refuge and a source of logistical and financial resources during the Cold War decades, terrorist groups in the post Cold War period no longer enjoy the support of communist countries. Moreover, state sponsors of international terrorism (see Glossary) toned down their support of terrorist groups. In this new environment where terrorist groups can no longer depend on state support or any significant popular support, they have been restructuring in order to learn how to operate independently. New breeds of increasingly dangerous religious terrorists emerged in the 1990s. The most dangerous type is the Islamic fundamentalist. A case in point is Ramzi Yousef, who brought together a loosely organized, ad hoc group, the so-called Liberation Army, apparently for the sole purpose of carrying out the WTC operation on February 26, Moreover, by acting independently the small self-contained cell led by Yousef prevented authorities from linking it to an established terrorist organization, such as its suspected coordinating group, 3

12 Osama bin Laden s al-qaida, or a possible state sponsor. Aum Shinrikyo is representative of the other type of religious terrorist group, in this case a cult. Shoko Asahara adopted a different approach to terrorism by modeling his organization on the structure of the Japanese government rather than an ad hoc terrorist group. Accordingly, Aum Shinrikyo ministers undertook a program to develop WMD by bringing together a core group of bright scientists skilled in the modern technologies of the computer, telecommunications equipment, information databases, and financial networks. They proved themselves capable of developing rudimentary WMD in a relatively short time and demonstrated a willingness to use them in the most lethal ways possible. Aum Shinrikyo s sarin gas attack in the Tokyo subway system in 1995 marked the official debut of terrorism involving WMD. Had a more lethal batch of sarin been used, or had the dissemination procedure been improved slightly, the attack might have killed thousands of people, instead of only a few. Both of these incidents the WTC bombing and the Tokyo subway sarin attack had similar casualty totals but could have had massive casualties. Ramzi Yousef s plot to blow up the WTC might have killed an estimated 50,000 people had his team not made a minor error in the placement of the bomb. In any case, these two acts in Manhattan and Tokyo seem an ominous foretaste of the WMD terrorism to come in the first decade of the new millennium. Increasingly, terrorist groups are recruiting members with expertise in fields such as communications, computer programming, engineering, finance, and the sciences. Ramzi Yousef graduated from Britain s Swansea University with a degree in engineering. Aum Shinrikyo s Shoko Asahara recruited a scientific (www.greatbuildings.com/buildings/ World_Trade_Center.html) team with all the expertise needed to develop WMD. Osama bin Laden also recruits highly skilled professionals in the fields of engineering, medicine, chemistry, physics, computer programming, communications, and so forth. Whereas the skills of the elite terrorist commandos of the 1960s and 1970s were often limited to what they learned in training camp, the terrorists of the 1990s who have carried out major operations have included biologists, chemists, computer specialists, engineers, and physicists. 4

13 New Forms of Terrorist-Threat Scenarios The number of international terrorist incidents has declined in the 1990s, but the potential threat posed by terrorists has increased. The increased threat level, in the form of terrorist actions aimed at achieving a larger scale of destruction than the conventional attacks of the previous three decades of terrorism, was dramatically demonstrated with the bombing of the WTC. The WTC bombing illustrated how terrorists with technological sophistication are increasingly being recruited to carry out lethal terrorist bombing attacks. The WTC bombing may also have been a harbinger of more destructive attacks of international terrorism in the United States. Although there are not too many examples, if any, of guerrilla (see Glossary) groups dispatching commandos to carry out a terrorist operation in the United States, the mindsets of four groups discussed herein two guerrilla/terrorist groups, a terrorist group, and a terrorist cult are such that these groups pose particularly dangerous actual or potential terrorist threats to U.S. security interests. The two guerrilla/terrorist groups are the Liberation Tigers of Tamil Ealam (LTTE) and Hizballah, the terrorist group is al-qaida, and the terrorist cult is Aum Shinrikyo. The LTTE is not known to have engaged in anti-u.s. terrorism to date, but its suicide commandos have already assassinated a prime minister of India, a president of Sri Lanka, and a former prime minister of Sri Lanka. In August 1999, the LTTE reportedly deployed a 10-member suicide squad in Colombo to assassinate Prime Minister Chandrika Kumaratunga and others. It cannot be safely assumed, however, that the LTTE will restrict its terrorism to the South Asian subcontinent. Prabhakaran has repeatedly warned the Western nations providing military support to Sri Lanka that they are exposing their citizens to possible attacks. The LTTE, which has an extensive international network, should not be underestimated in the terrorist threat that it could potentially pose to the United States, should it perceive this country as actively aiding the Sri Lankan government s counterinsurgency campaign. Prabhakaran is a megalomaniac whose record of ordering the assassinations of heads of state or former presidents, his meticulous planning of such actions, his compulsion to have the acts photographed and chronicled by LTTE members, and the limitless supply of female suicide commandos at his disposal add a dangerous new dimension to potential assassination threats. His highly trained and disciplined Black Tiger commandos are far more deadly than Aum Shinrikyo s inept cultists. There is little protection against the LTTE s trademark weapon: a belt-bomb suicide 5

14 commando. Hizballah is likewise quite dangerous. Except for its ongoing terrorist war against Israel, however, it appears to be reactive, often carrying out terrorist attacks for what it perceives to be Western military, cultural, or political threats to the establishment of an Iranian-style Islamic republic in Lebanon. The threat to U.S. interests posed by Islamic fundamentalist terrorists in particular was underscored by al-qaida s bombings of the U.S. Embassies in Kenya and Tanzania in August With those two devastating bombings, Osama bin Laden resurfaced as a potent terrorist threat to U.S. interests worldwide. Bin Laden is the prototype of a new breed of terrorist the private entrepreneur who puts modern enterprise at the service of a global terrorist network. With its sarin attack against the Tokyo subway system in March 1995, Aum Shinrikyo has already used WMD, and very likely has not abandoned its quest to use such weapons to greater effect. The activities of Aum s large membership in Russia should be of particular concern because Aum Shinrikyo has used its Russian organization to try to obtain WMD, or at least WMD technologies. The leaders of any of these groups Prabhakaran, bin Laden, and Asahara could become paranoid, desperate, or simply vengeful enough to order their suicide devotees to employ the belt-bomb technique against the leader of the Western World. Iranian intelligence leaders could order Hizballah to attack the U.S. leadership in retaliation for some future U.S. or Israeli action, although Iran may now be distancing itself from Hizballah. Whether or not a U.S. president would be a logical target of Asahara, Prabhakaran, or bin Laden is not a particularly useful guideline to assess the probability of such an attack. Indian Prime Minister Rajiv Gandhi was not a logical target for the LTTE, and his assassination had very negative consequences for the LTTE. In Prabhakaran s psycho-logic, to use Post s term, he may conclude that his cause needs greater international attention, and targeting a country s top leaders is his way of getting attention. Nor does bin Laden need a logical reason, for he believes that he has a mandate from Allah to punish the Great Satan. Instead of thinking logically, Asahara thinks in terms of a megalomaniac with an apocalyptic outlook. Aum Shinrikyo is a group whose delusional leader is genuinely paranoid about the United States and is known to have plotted to assassinate Japan s emperor. Shoko Asahara s cult is already on record for having made an assassination threat against President Clinton. 6

15 If Iran s mullahs or Iraq s Saddam Hussein decide to use terrorists to attack the continental United States, they would likely turn to bin Laden s al-qaida. Al-Qaida is among the Islamic groups recruiting increasingly skilled professionals, such as computer and communications technicians, engineers, pharmacists, and physicists, as well as Ukrainian chemists and biologists, Iraqi chemical weapons experts, and others capable of helping to develop WMD. Al-Qaida poses the most serious terrorist threat to U.S. security interests, for al-qaida s well-trained terrorists are actively engaged in a terrorist jihad against U.S. interests worldwide. These four groups in particular are each capable of perpetrating a horrific act of terrorism in the United States, particularly on the occasion of the new millennium. Aum Shinrikyo has already threatened to use WMD in downtown Manhattan or in Washington, D.C., where it could attack the Congress, the Pentagon s Concourse, the White House, or President Clinton. The cult has threatened New York City with WMD, threatened to assassinate President Clinton, unsuccessfully attacked a U.S. naval base in Japan with biological weapons, and plotted in 1994 to attack the White House and the Pentagon with sarin and VX. If the LTTE s serial assassin of heads of state were to become angered by President Clinton, Prabhakaran could react by dispatching a Tamil belt-bomb girl to detonate a powerful semtex bomb after approaching the President in a crowd with a garland of flowers or after jumping next to his car. Al-Qaida s expected retaliation for the U.S. cruise missile attack against al- Qaida s training facilities in Afghanistan on August 20, 1998, could take several forms of terrorist attack in the nation s capital. Al-Qaida could detonate a Chechen-type building-buster bomb at a federal building. Suicide bomber(s) belonging to al-qaida s Martyrdom Battalion could crash-land an aircraft packed with high explosives (C-4 and semtex) into the Pentagon, the headquarters of the Central Intelligence Agency (CIA), or the White House. Ramzi Yousef had planned to do this against the CIA headquarters. In addition, both al-qaida and Yousef were linked to a plot to assassinate President Clinton during his visit to the Philippines in early Following the August 1998 cruise missile attack, at least one Islamic religious leader called for Clinton s assassination, and another stated that the time is not far off for when the White House will be destroyed by a nuclear bomb. A horrendous scenario consonant with al-qaida s mindset would be its use of a nuclear suitcase bomb against any number of targets in the nation s capital. Bin Laden allegedly has already purchased a number of nuclear suitcase bombs from the Chechen Mafia. Al-Qaida s retaliation, however, is more likely to take the lower-risk form of bombing one or more U.S. airliners with time- 7

16 bombs. Yousef was planning simultaneous bombings of 11 U.S. airliners prior to his capture. Whatever form an attack may take, bin Laden will most likely retaliate in a spectacular way for the cruise missile attack against his Afghan camp in August

17 While nothing is easier than to denounce the evildoer, nothing is more difficult than to understand him. Fyodor Mikhailovich Dostoevsky INTRODUCTION Why do some individuals decide to break with society and embark on a career in terrorism? Do terrorists share common traits or characteristics? Is there a terrorist personality or profile? Can a terrorist profile be developed that could reliably help security personnel to identify potential terrorists, whether they be would-be airplane hijackers, assassins, or suicide bombers? Do some terrorists have a psychotic (see Glossary) personality? Psychological factors relating to terrorism are of particular interest to psychologists, political scientists, and government officials, who would like to be able to predict and prevent the emergence of terrorist groups or to thwart the realization of terrorist actions. This study focuses on individual psychological and sociological characteristics of terrorists of different generations as well as their groups in an effort to determine how the terrorist profile may have changed in recent decades, or whether they share any common sociological attributes. The assumption underlying much of the terrorist-profile research in recent decades has been that most terrorists have some common characteristics that can be determined through psychometric analysis of large quantities of biographical data on terrorists. One of the earliest attempts to single out a terrorist personality was done by Charles A. Russell and Bowman H. Miller (1977) (see Attributes of Terrorists). Ideally, a researcher attempting to profile terrorists in the 1990s would have access to extensive biographical data on several hundred terrorists arrested in various parts of the world and to data on terrorists operating in a specific country. If such data were at hand, the researcher could prepare a psychometric study analyzing attributes of the terrorist: educational, occupational, and socioeconomic background; general traits; ideology; marital status; method and place of recruitment; physical appearance; and sex. Researchers have used this approach to study West German and Italian terrorist groups (see Females). Such detailed information would provide more accurate sociological profiles of terrorist groups. Although there appears to be no single terrorist personality, members of a terrorist group(s) may share numerous common sociological traits. 9

19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

Erbil Declaration Regional Women s Security Forum on Resolution UNSCR 1325 The Women s Security Forum on Resolution No 1325 for the Middle East and North Africa (MENA) region concluded its work in Erbil

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina

BACKGROUND REPORT Overview: Terrorism in In, more than 16,800 terrorist attacks took place worldwide, causing more than 43,500 deaths and more than 40,900 injuries, including perpetrator casualties. More

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN

CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

Psychological Warfare and Terrorism Robert D. Hanser This brief article demonstrates that there are common psychological principles that can be effectively and directly applied to illustrate the utility

A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

University Press Scholarship Online You are looking at 1-6 of 6 items for: keywords : bounded choice Bounded Choice: Cult Formation and the Development of the True Believer california/9780520231948.003.0011

RESPONSE TO THE GOVERNMENT REVIEW OF THE MUSLIM BROTHERHOOD 22 DECEMBER 2015 PHOTO: ALLEGED MUSLIM BROTHERHOOD HEADQUARTERS IN LONDON CAMPAIGN AGAINST ANTISEMITISM PO Box 2647, London W1A 3RB Registered

Political Science Courses-1 American Politics POL 110/American Government Examines the strengths and weaknesses, problems and promise of representative democracy in the United States. Surveys the relationships

Lesson Plan: Islamophobia in the Shadow of 9/11 Grades 10-12 Purpose In this lesson, students will critically analyze various media for manifestations of Islamophobia. They will also learn to recognize

AP PHOTO/HUSSEIN MALLA The Plight of Christians in the Middle East Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil By Brian Katulis, Rudy deleon, and John Craig March 2015

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

INFORMATION SHARING IN SUPPORT OF STRATEGIC INTELLIGENCE Prepared for an international conference on Countering Modern Terrorism History, Current Issues, and Future Threats 16-17 December 2004 Berlin Under

Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

THE EARLY HISTORY OF THE DISASTER RESEARCH CENTER* By E. L Quarantelli The Disaster Research Center (DRC) came into being somewhat informally at the Ohio State University in August 1963. Its appearance

Background Report: 9/11, Ten Years Later THE UNIQUE NATURE OF 9/11 Among terrorism incidents in the United States and around the world, al-qa ida s attacks on September 11, 21, are notably unique. FATALITIES

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division UNITED STATES OF AMERICA ) ) v. ) Criminal No. 01-455-A ) ZACARIAS MOUSSAOUI, ) Defendant ) Statement of Facts

South Asia Overview (Our) relationships with South Asian states have been central to our successful prosecution of the war on terrorism. All have been fully supportive, and their support in this war has

Worldwide Terrorism, Part 2 By William R. Polk In my previous article, I described the inspiration for Islamic resistance to the West and how opposition to Soviet imperialism coalesced the main movement

Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)

COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

This is a Testimony On National Security and Defense 20 Years Later: Professional Military Education Published on May 20, 2009 by James Carafano, Ph.D. Testimony before the Sub-Committee on Oversight and

Social Science A Common Core of Standards [27.200] All social science teachers shall be required to demonstrate competence in the common core of social science standards. In addition, each social science

The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION WHAT IS MSS The interdisciplinary Military Strategic Studies program is concerned with understanding, analyzing and explaining the military dimension

Countering Complexity: An Analytical Framework to Guide Counter-Terrorism Policy-Making Brent Ellis Abstract The development of religiously motivated terrorism has increased the complexity of the terrorist

WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

Page 1 The Center of the World offers insights into American history topics including the post-world War II economic order, city planning in the era of urban renewal, and globalization and its consequences.

Standard: History Enlightenment Ideas A. Explain connections between the ideas of the Enlightenment and changes in the relationships between citizens and their governments. 1. Explain how Enlightenment

148 Summaries Justitiële verkenningen (Judicial explorations) is published nine times a year by the Research and Documentation Centre of the Dutch Ministry of Justice in cooperation with Boom Juridische

Does NATO s Article V Genuinely Protect Its Members? NATO has been the most successful alliance of history. We repeat this truth quite frequently, especially now that we celebrate 60 years of its successful

Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

In the Supreme Court HCJ 9594/03 sitting as the High Court of Justice B Tselem et al. represented by attorneys Stein et al. The Petitioners v. Judge Advocate General represented by the State Attorney s

Arrest of Hamas Activists who have Undergone Training (1995-1998) in a Military College in Iran, Designated to Serve as Future Military Commanders Background Ismail Jaabari and Mohammad Halef, two Gaza-Strip

To what extent were the policies of the United States responsible for the outbreak and development of the Cold War between 1945 and 1949? Although the dominant military confrontations of the 20 th century

. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

Standards Addressed by The Choices Program National Standards for the Social Studies National Standards for Social Studies are available online at cnets.iste.org/currstands. Strand I: Culture and Cultural

NATIONAL REPORT 2007/2008 DENMARK INTRODUCTION All initiatives by the Danish Armed Forces (DAF) in connection with new policies, recruitment, retention, training and career development are based on equality

Sexual Violence as Weapon of War By Lydia Farah Lawyer & Legal researcher In general women face in peacetime as well as in wartime different forms of discrimination and gender based violence. But during

The Thesis Submitted to The Department of Political Science, Faculty of Social Science For the Award of Doctorate of Philosophy in Political Science Osmania University, Hyderabad, India Abstract Globalization

Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider

Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington Foreword by Kevin Ryan December 2015 Defense and Intelligence The Meaning of Russia s Campaign in Syria By S.R. Covington

Meeting the Challenges Posed by High Risk Offenders Types of High Risk Offenders High Risk offenders can be classified into four categories. These include the most violent, disruptive hardened criminals

STATE OF ISRAEL Ministry of Public Security Bureau of the Chief Scientist Public Assessments and Public Attitudes toward Israel Prison Service 2013 DR. Shuki Hendeles Taldor This study reported herewith

ZRÍNYI MIKLÓS NATIONAL DEFENCE UNIVERSITY MILITARY SCIENCES PHD SCHOOL Colonel Antal Beraczkai THE PREPARATION AND OPERATIONAL ACTIVITIES OF ALLIED AND HUNGARIAN MILITARY SECURITY FORCES AGAINST INTERNATIONAL

Europol Public Information Changes in modus operandi of Islamic State terrorist attacks Review held by experts from Member States and Europol on 29 November and 1 December 2015 The Hague, 18 January 2016

The 11 th Crusade For A Fee Written by Jacob S. "The most important thing is for us to find Osama bin Laden. It is our number one priority and we will not rest until we find him." --Washington, D.C., Sept.

CHAPTER 13: International Law, Norms, and Human Rights MULTIPLE CHOICE 1. Why did the former Secretary General of the United Nations, Kofi Annan, state that the US invasion of Iraq in 2003 was illegal?

The Sixth ISODARCO Beijing Seminar on Arms Control October 29-Novermber 1, 1998 Shanghai, China The Implication of TMD System in Japan to China s Security Institute of World Economics & Politics Chinese

OHIO HEART AND SOUL www.tedstrickland.com Ohio Families First: Defeating Terrorism & Keeping Americans Safe On 9/11, our country was attacked on our home soil, and none of us who lived through that day

CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those

Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

September 11, 2001 Lecture 17: Religious Conflict and Terrorism Part I: Islam and Christianity Part II: Religion and Terrorism Part III: Osama Bin Laden and Al-Qaeda Part IV: Institutions/Strategies September

Dear Delegates, It is a pleasure to welcome you to the 2016 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN